by
Hardjono, Thomas.
Call Number
005.8 22
Publication Date
2003
Summary
A handbook for engineers, architects and other practitioners working in the field of Internet security. It presents detailed coverage of security technologies and techniques for IP (Internet protocol) multicast networks, along with algorithms and protocols for multi-party secure communication.
Format:
Electronic Resources
Relevance:
8.2293
by
NATO Advanced Research Workshop on Cyberwar-Netwar: Security in the Information Age (2003 : Lisbon, Portugal)
Call Number
355.343 22
Publication Date
2006
Summary
Internet is entering a stage which will have a stronger impact on the daily lives of all kinds of organizations.
Format:
Electronic Resources
Relevance:
6.7662
View Other Search Results
by
Yehoshua, Nir, author.
Call Number
005.8 23
Publication Date
2021
Summary
Develop more secure and effective antivirus solutions by leveraging antivirus bypass techniques. Antivirus software is built to detect, prevent, and remove malware from systems, but this does not guarantee the security of your antivirus solution as certain changes can trick the antivirus and pose a risk for users. This book will help you to gain a basic understanding of antivirus software and take you through a series of antivirus bypass techniques that will enable you to bypass antivirus solutions. The book starts by introducing you to the cybersecurity landscape, focusing on cyber threats, malware, and more. You will learn how to collect leads to research antivirus and explore the two common bypass approaches used by the authors. Once you've covered the essentials of antivirus research and bypassing, you'll get hands-on with bypassing antivirus software using obfuscation, encryption, packing, PowerShell, and more. Toward the end, the book covers security improvement recommendations, useful for both antivirus vendors as well as for developers to help strengthen the security and malware detection capabilities of antivirus software. By the end of this security book, you'll have a better understanding of antivirus software and be able to confidently bypass antivirus software. This book is for security researchers, malware analysts, reverse engineers, pentesters, antivirus vendors looking to strengthen their detection capabilities, antivirus users and companies that want to test and evaluate their antivirus software, organizations that want to test and evaluate antivirus software before purchase or acquisition, and tech-savvy individuals who want to learn new topics.
Format:
Electronic Resources
Relevance:
6.0062
by
Oppliger, Rolf.
Call Number
621.38 22
Publication Date
2009
Format:
Electronic Resources
Relevance:
4.8312
by
Aissi, Selim.
Call Number
621.384 22
Publication Date
2006
Format:
Electronic Resources
Relevance:
4.7508
by
Olups, Rihards.
Call Number
005.8 22
Publication Date
2010
Format:
Electronic Resources
Relevance:
4.7387
by
Dubrawsky, Ido.
Call Number
005.8 22
Publication Date
2007
Summary
Most System Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. How to Cheat at Securing Your Network is the perfect book for this audience. The book takes the huge amount of information available on network security and distils it into concise recommendations and instructions, using real-world, step-by-step instruction. The latest addition to the bestselling "How to Cheat ..." series of IT handbooks, this book clearly identifies the primary vulnerabilities of most computer networks, including user access, remote access, messaging, wireless hacking, media, email threats, storage devices, and web applications. Solutions are provided for each type of threat, with emphasis on intrusion detection, prevention, and disaster recovery. .Get an Introduction to AAA See how AAA is made up of three distinct but interdependent parts: access control, authentication, and auditing. .Understand the Types of Attacks Learn about active attacks: network-based, application-based, and mixed threat, as well as passive attacks, password attacks, and code attacks. .Address Remote Access Problems Technologies such as RAS servers, NAS, VPN, authentication servers like RADIUS, TACACS, and TACACS+, and others were designed to address the RAS problems. .Review Wireless Technologies Understand WAP and IEEE 802/11 WLAN wireless security methods. .Web Servers are Critical Network Components Make sure that they are as safe as possible and know the issues regarding Web services. .Know the Differences Between Device-Based and Media-Based Security See how wireless, modems, RAS, PBXs, and VPNs allow remote access to a computer or network. .See the Concepts and Processes of OS and NOS Hardening Track, evaluate, and install the appropriate OS patches, updates, service packs, and hotfixes in your system environment. .Understand the Basics of Cryptography See how confidentiality, integrit. Printbegrænsninger: Der kan printes kapitelvis.
Format:
Electronic Resources
Relevance:
4.6735
8.
by
Xiao, Yang, 1966-
Call Number
005.8 22
Publication Date
2011
Format:
Electronic Resources
Relevance:
4.6600
by
Hurley, Chris.
Call Number
005.8 22
Publication Date
2007
Summary
Over 300 New Penetration Testing Tools in this Volume 2.
Format:
Electronic Resources
Relevance:
4.6578
by
Krishnamurthy Madwachar, Mohan.
Call Number
005.8 22
Publication Date
2008
Summary
Are you one of the millions of SysAdmins running a Linux server who cant find a current book on Linux security? Well.this is the book for you. How to Cheat at Securing Linux Servers is designed to help you deploy a Linux system on the Internet in a variety of security roles. This book provides practical instructions and pointers concerning the open source security tools that we use every day. This book shows you how to use your Linux skills to provide the most important security services such as encryption, authentication, access control, and logging. While writing the book, the authors had the following three-part structure in mind: locking down the network, securing data passing across the network, and protecting the network perimeter with firewalls, DMZs, and VPNs. The Perfect Reference for the Multitasked SysAdmin * Discover Why "Measure Twice, Cut Once" Applies to Securing Linux * Complete Coverage of Hardening the Operating System, Implementing an Intrusion Detection System, and Defending Databases * Short on Theory, History, and Technical Data that Is Not Helpful in Performing Your Job.
Format:
Electronic Resources
Relevance:
4.6530
by
Mendell, Ronald L.
Call Number
005.8
Publication Date
2007
Summary
This text identifies common pitfalls in document security and suggests remedies to prevent its occurrence. It strives to alert an audience of managers, security professionals, and workers who come in regular contact with sensitive information. Recognition of how sensitive documents can violate the principle of confidentiality is the primary focus of the book. Chapter 1 discusses metadata in documents. Paying attention to this issue can reduce unintentional release of sensitive information. Chapter 2 explores Web-facing documents and how search engines like Google can uncover sensitive data in.
Format:
Electronic Resources
Relevance:
4.6373
by
Porter, Thomas.
Call Number
005.8 22
Publication Date
2006
Summary
Voice Over IP (VoIP) phone lines now represent over 50% of all new phone line installations. Every one of these new VoIP phone lines and handsets must now be protected from malicious hackers because these devices now reside on the network and are accessible from the Internet just like any server or workstation. This book will cover a wide variety of the publicly available exploit tools and how they can be used specifically against VoIP (Voice over IP) Telephony systems. The book will cover the attack methodologies that are used against the SIP and H.323 protocols as well as VoIP network infrastructure. Significant emphasis will be placed on both attack and defense techniques. This book is designed to be very hands on and scenario intensive More VoIP phone lines are being installed every day than traditional PBX phone lines VoIP is vulnerable to the same range of attacks of any network device VoIP phones can receive as many Spam voice mails as your e-mail can receive Spam e-mails, and as result must have the same types of anti-spam capabilities.
Format:
Electronic Resources
Relevance:
4.6187
Limit Search Results